Entry Mano:2008:RRI from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Mano:2008:RRI,
  author =       "Chad D. Mano and Andrew Blaich and Qi Liao and Yingxin
                 Jiang and David A. Cieslak and David C. Salyers and
                 Aaron Striegel",
  title =        "{RIPPS}: {Rogue Identifying Packet Payload Slicer
                 Detecting Unauthorized Wireless Hosts Through Network
                 Traffic Conditioning}",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "2",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1330332.1330334",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:41 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Wireless network access has become an integral part of
                 computing both at home and at the workplace. The
                 convenience of wireless network access at work may be
                 extremely beneficial to employees, but can be a burden
                 to network security personnel. This burden is magnified
                 by the threat of inexpensive wireless access points
                 being installed in a network without the knowledge of
                 network administrators. These devices, termed
                 {$<$}it{$>$}Rogue Wireless Access Points{$<$}/it{$>$},
                 may allow a malicious outsider to access valuable
                 network resources, including confidential communication
                 and other stored data. For this reason, wireless
                 connectivity detection is an essential capability, but
                 remains a difficult problem. We present a method of
                 detecting wireless hosts using a local RTT metric and a
                 novel packet payload slicing technique. The local RTT
                 metric provides the means to identify physical
                 transmission media while packet payload slicing
                 conditions network traffic to enhance the accuracy of
                 the detections. Most importantly, the packet payload
                 slicing method is transparent to both clients and
                 servers and does not require direct communication
                 between the monitoring system and monitored hosts.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "network security; rogue systems; traffic
                 conditioning",
}

Related entries